Remote Control System The Hacking Suite for Governmental

  • Slides: 44
Download presentation
Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013

Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013

The Building Blocks

The Building Blocks

Remote Agent Secure Frontend Scalable Backend Infection Vectors

Remote Agent Secure Frontend Scalable Backend Infection Vectors

Complete solution, not a toolkit Totally developed by us

Complete solution, not a toolkit Totally developed by us

Remote agent Your personal 007

Remote agent Your personal 007

What can we collect?

What can we collect?

Camera Calls Messages Location Chat Keystrokes Microphone Documents Contacts Passwords Calendars Visited websites And

Camera Calls Messages Location Chat Keystrokes Microphone Documents Contacts Passwords Calendars Visited websites And much more…

Runs on an event-driven logic Autonomous

Runs on an event-driven logic Autonomous

Events When crossing the border Every day at midnight On hidden SMS On voice

Events When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot

Many different events and actions Combine them to suit your needs

Many different events and actions Combine them to suit your needs

What if my target is security aware?

What if my target is security aware?

Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures Resistant to format

Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures Resistant to format and restoration

Evidence on remote device How can we collect it?

Evidence on remote device How can we collect it?

Internet connection Firewalls and proxies are passed through

Internet connection Firewalls and proxies are passed through

Wi. Fi Open and saved networks

Wi. Fi Open and saved networks

GPRS / UMTS / 3 G+ Avoid billing the target with custom APN

GPRS / UMTS / 3 G+ Avoid billing the target with custom APN

Where can I install the Agent?

Where can I install the Agent?

Secure Frontend An invisible barrier

Secure Frontend An invisible barrier

Agent is connecting to your servers Your identity must be kept secret

Agent is connecting to your servers Your identity must be kept secret

Configurable on-the-fly Evidence stays encrypted

Configurable on-the-fly Evidence stays encrypted

Scalable Backend Your data vault

Scalable Backend Your data vault

Scalable by design

Scalable by design

Agents Collector Database x 300

Agents Collector Database x 300

Agents Collector 1 Collector 2 x 10000 … Collector N Database Shard 1 Shard

Agents Collector 1 Collector 2 x 10000 … Collector N Database Shard 1 Shard 2 … Shard N

Scale when you need Adding servers is transparent Load balancing is automatic

Scale when you need Adding servers is transparent Load balancing is automatic

No database administration required Set & Forget backups Fast restore in 5 minutes

No database administration required Set & Forget backups Fast restore in 5 minutes

Real-time alerting Be informed on interesting events

Real-time alerting Be informed on interesting events

Polished graphical console The whole system from a single point

Polished graphical console The whole system from a single point

Infection Vectors Deploy your forces

Infection Vectors Deploy your forces

How can I deploy my agent?

How can I deploy my agent?

When the target opens a document

When the target opens a document

0 -day exploits pack Always up to date

0 -day exploits pack Always up to date

While the target browses the web

While the target browses the web

Inject into downloaded applications Inject into web pages

Inject into downloaded applications Inject into web pages

Bob’s laptop Internet Network Injector Web site

Bob’s laptop Internet Network Injector Web site

Send your target an SMS

Send your target an SMS

And many more…

And many more…

Third-party Integration Combine your weapons

Third-party Integration Combine your weapons

Easily integrate with your monitoring center

Easily integrate with your monitoring center

Demo time!

Demo time!